Exploiting Redundancy for Secure Data Dissemination in Wireless Sensor Networks

نویسندگان

  • Luis E. Palafox
  • J. Antonio García-Macías
چکیده

Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical clustered sensor networks that integrates security and reduces communication overhead by removing data redundancy from the network. Furthermore, we show that by using our protocol we can provide security to the network without spending additional energy resources, particularly when we are dealing with high levels of redundancy. Additionally, a military monitoring application is introduced as a case study to evaluate the functionality of our protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Exploiting Redundancy for Secure Data Dissemination in Wireless Sensor Networks Explotando Redundancia para Diseminación Segura de Datos en Redes Inalámbricas de Sensores

Monitoring the environment is one of the main applications of wireless sensor networks. Given that these networks are densely populated and that local variations in the environmental variables are small, a large amount of redundant data is generated by sensor nodes. In this paper we present a protocol for data dissemination in hierarchical clustered sensor networks that integrates security and ...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computación y Sistemas

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2007